A Combinational Power Analysis Method against Cryptographic Hardware

被引:2
作者
Guo Zheng [1 ,3 ]
Gu Dawu [1 ]
Lu Haining [1 ]
Liu Junrong [1 ,3 ]
Xu Sen [1 ]
Bao Sigang [2 ]
Gu Haihua [2 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
[2] Shanghai Huahong Integrated Circuit Co Ltd, Shanghai 201203, Peoples R China
[3] Shanghai Viewsource Informat Sci & Technol Co Ltd, Shanghai 200241, Peoples R China
基金
中国国家自然科学基金;
关键词
cryptographic hardware; side channel attack; power analysis; combinational logic;
D O I
10.1109/CC.2015.7084387
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Power analysis is a non-invasive attack against cryptographic hardware, which effectively exploits runtime power consumption characteristics of circuits. This paper proposes a new power model which combines Hamming Distance model and the model based on the template value of power consumption in combinational logic circuit. The new model can describe the power consumption characteristics of sequential logic circuits and those of combinational logic as well. The new model can be used to improve the existing power analysis methods and detect the information leakage of power consumption. Experimental results show that, compared to CPA(Correlation Power Analysis) method, our proposed attack which adopt the combinational model is more efficient in terms of the number of required power traces.
引用
收藏
页码:99 / 107
页数:9
相关论文
共 13 条
[1]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[2]  
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[3]  
Cheng W., 2011, COMMUNICATIONS TECHN, V44, P123
[4]  
Gierlichs B, 2008, LECT NOTES COMPUT SC, V5154, P426
[5]  
Knudsen L, 2010, LECT NOTES COMPUT SC, V6225, P16, DOI 10.1007/978-3-642-15031-9_2
[6]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[7]  
Mangard S, 2005, LECT NOTES COMPUT SC, V3659, P157
[8]  
Qu B., 2012, COMPUTERS MATH APPL
[9]  
Stefan M., 2007, POWER ANAL ATTACKS R, V31
[10]  
Suzuki D, 2005, LECT NOTES COMPUT SC, V3659, P366